X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 internet safety


Fighting Cybercrime on the Internet
Excerpts from a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000

internet safety  Fighting Cybercrime on the Internet L. Taylor - July 18, 2000 Introduction This note is based on a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center. Note : Portions of this note are excerpted from the presentation, other parts are explanatory text to relate this information to the Technology community serviced by the TEC web site. Information that was not taken directly from

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Web Content Management (WCM)

Web content management (WCM) systems manage content creation, review, and approval processes for web site content. This may include public Web sites (Internet) or private web sites (intranet or extranet). Use a WCM solution to organize and manage documents; provide content version control, collaboration utilities, and user- or document-level security. 

Start Now

Documents related to » internet safety

Food and Drug Safety: Prevention Better Than Cure (For Sure) - Part 2


Part I of this blog series introduced the burning issues of food safety and the resultant need for a holistic and proactive safety strategy (rather than to reactively recall plagued products). The previous post also talked in more detail about Lawson Software’s holistic approach entitled The "4Ps" of Food Safety. In this part, Rory Granros, process industry and product marketing manager at

internet safety   Read More

Five Must-have ERP Features for Medical Device Manufacturers


In the medical device manufacturing industry, errors can cost more than money—they can cost lives. In order to meet safety regulations, manufacturers are turning to enterprise resource planning (ERP) solutions. Discover the five features any medical device manufacturer should look for in an ERP system in order to meet compliance requirements, produce high-quality products, operate efficiently, and maximize profitability.

internet safety   Read More

Tracing Food Quality and Safety, or We Are What We Eat, After All (Part II)


Part I of this blog post introduced the burning issues of food safety and the ensuing need for traceability. To the end of providing entire food supply chain traceability and information visibility, mid-March, during its CUE 2008 annual user conference, Lawson Software announced the availability of Lawson M3 Trace Engine 3.0, the first version offered within the US market. The application is

internet safety   Read More

Legal Risks of Uncontrolled E-mail and Web Access


E-mail and the Internet are critical resources for most organizations, but the attributes that make them so essential can generate significant legal risks for employers. E-mail and Internet misuse continues unabated. This paper considers some of the risks of employee use of e-mail and the Internet and suggests solutions such as setting up effective usage policies to help reduce risk.

internet safety   Read More

Logistics.com Might Prove An Internet Success Story After All- Part 2: Market Impact


By being able to address the needs of all stakeholders across the board from shipper to transport provider, and with the marketplace/private trading exchange (PTX) tool in the middle, Logistics.com can connect trading partners at various levels.

internet safety   Read More

Food and Drug Safety: Prevention Better Than Cure (For Sure) - Part 1


Food production and distribution is a serious and strategic business, and I am not aware of anyone in my surroundings that takes it lightly; food can not only delight us, but can also make us quite sick and indisposed. While my inner circles (pets included) have luckily not been casualties of recent salmonella, E.coli, and whatnot outbreaks from tainted chilly peppers, tomatoes, spinach, pet food,

internet safety   Read More

Internet Trust Marks: Building Confidence and Profit Online


Learn all about trustmarks, and how they boost online sales in Internet Trust Marks: Building Confidence and Profit Online.

internet safety   Read More

PeopleSoft - Catching Its Second Wind From The Internet Part 3: Predictions and Recommendations


Now that PeopleSoft has a pure Internet platform, a new set of products and a new assertive attitude, it faces strong retaliatory actions from the competition. Can it achieve number two in the ERP space?

internet safety   Read More

Protect Yourself Against "Converged" Internet Threats


Find out how to protect yourself in the symantec white paper converged threats on the security landscape.

internet safety   Read More

Application Access over the Internet: Cloud Computing Service for Higher Education


Wipro completed a research project to understand how application and desktop virtualization technology can be best harnessed for the needs of higher education and compare traditional systems integration implementation approach with a cloud computing model. The team conducted in-depth interviews with a set of colleges and universities that have considered, piloted, or already deployed such solutions. This document is a summary of the research findings and conclusions.

internet safety   Read More